Fact-checked by Grok 2 weeks ago

Cipher disk

A cipher disk is a encryption and decryption tool consisting of two concentric disks—one fixed and one rotatable—each inscribed with letters or symbols, designed to perform substitution ciphers, including variants, by aligning alphabets through rotation. Invented around 1467 by , an , architect, and author, the device was detailed in his treatise De Cifris and marked the first known implementation of a in the West, enabling more secure communication for diplomats and scholars by varying the substitution mapping dynamically. Alberti's original construction used metal disks connected by an , with the outer stationary disk featuring a standard uppercase of 20 letters (A–Z excluding J, U, W) plus numerals 1–4 for referencing codebooks or nulls, and the inner movable disk bearing a randomized uppercase of the same letters plus the symbol for "et" (&). To operate the device, users agree on a starting key letter in advance; the inner disk's index mark is aligned with this letter on the outer disk, and letters from the outer ring are substituted with the aligned letters on the inner ring to produce . For polyalphabetic security, the inner disk is rotated at predetermined intervals—often after a set number of letters or guided by a keyword repeated as a —shifting the alignment and thus changing the active alphabet, which complicates compared to monoalphabetic systems. This method allowed for concise, portable without needing extensive tables or papers, making it practical for field use. Subsequent developments built on Alberti's innovation, including later variants such as the , which uses the full 26-letter on both disks, with the inner disk's letters shifted relative to the outer to replicate variations for each position in a repeating keyword, effectively mechanizing the Vigenère tableau. In 1891, French cryptologist Étienne Bazeries created a more advanced disk device incorporating multiple substitution rings and principles akin to polyalphabetic progression, independently rediscovering concepts similar to those in Thomas Jefferson's earlier wheel cipher cylinder from the late . disks saw practical military application during the , where Union signal officers patented and used versions with standard and reversed alphabets for tactical messages, recommending frequent key changes for added security; simplified iterations were adopted by the U.S. Army around 1910 and employed through .

History

Invention and Early Development

The cipher disk originated with the , who invented it in 1467 and described it in his De Cifris (also known as De componendis cifris). This device marked the first known implementation of a using two concentric rotating disks, allowing for more secure encoding than previous monoalphabetic methods. Alberti's innovation addressed the limitations of earlier ciphers by enabling the substitution of letters with varying equivalents, thereby complicating through . Precursors to Alberti's cipher disk may have included advanced substitution techniques developed by Arab cryptographers such as Al-Kindi in the 9th century. These earlier systems laid conceptual groundwork for mechanical aids in cryptography, though Alberti's design was the first documented polyalphabetic application. Alberti's specific mechanism consisted of an outer fixed disk, termed the stabilis, engraved with 20 uppercase Latin letters (A, B, C, D, E, F, G, I, L, M, N, O, P, Q, R, S, T, V, X, Z) and the digits 1–4 in 24 cells, and an inner movable disk, the mobilis, featuring a scrambled lowercase Latin alphabet. The disks were connected by a central pin, permitting rotation of the inner disk relative to the outer one, with alignment achieved via a pointer or index to select corresponding letters for substitution. This configuration allowed users to generate multiple cipher alphabets by shifting the inner disk at predetermined intervals, enhancing security for diplomatic and scholarly communications. The cipher disk served as a mechanical precursor to tabular systems like the Vigenère cipher.

Military and Diplomatic Applications

Cipher disks, embodying the polyalphabetic principle pioneered by in the 15th century, found early application in European diplomatic communications during the 16th to 18th centuries. In , , a and cryptographer, adapted such polyalphabetic methods for secure correspondence, contributing to their use among government officials for protecting sensitive messages amid frequent international negotiations. These devices allowed envoys to encode dispatches quickly without relying on cumbersome codebooks, enhancing confidentiality in an era of and shifting alliances. Thomas Jefferson independently invented a multi-wheel cipher disk around 1795 while serving as U.S. , intending it for personal and potential diplomatic to safeguard official communications. Although not immediately adopted for widespread governmental use, Jefferson's design demonstrated the disk's practicality for secure exchanges in early American diplomacy, where threats from foreign powers necessitated discreet messaging. During the in the 1860s, the Confederate States employed a cipher disk with 26 letters for tactical military encryption, enabling field officers to transmit orders and without easy interception. forces also employed a similar cipher disk for encrypting and messages. In the , cipher disks saw continued military deployment during and II. The U.S. Army adopted the M-94 cipher device—a 25-disk system derived from Jefferson's wheel—for field encryption from 1922 to 1943, supporting in theaters like and the Pacific. European armies, including the and , similarly utilized Vigenère-style disks early in for low-level tactical signaling before transitioning to more advanced systems.

Design and Components

Basic Mechanical Structure

A cipher disk typically consists of two concentric circular disks mounted on a shared axle, allowing the inner disk to rotate freely relative to the stationary outer disk. The outer disk features a fixed alphabet, often the 26 letters of the English alphabet (A–Z) in later designs printed equally spaced around its circumference, serving as the reference for plaintext or ciphertext letters, while early versions like Alberti's used a 20-letter Latin alphabet excluding H, J, K, U, W, Y. The inner disk, which is smaller in diameter, bears a scrambled or shifted version of the alphabet, enabling the substitution of letters through alignment. The mechanism includes an or pointer, often a small notch or line on the outer disk's edge, that indicates the relative position of the inner disk. By rotating the inner disk, users can select from multiple possible alphabets, with the number depending on the size (e.g., 26 for English-based designs), each position corresponding to a unique shift or key setting agreed upon in advance. This rotational freedom forms the core of the device's polyalphabetic capability, where the same letter can map to different letters depending on the disk's orientation. In advanced designs, cipher disks incorporate polygraphic elements by including numbers, , or additional symbols alongside letters on one or both disks, expanding the options beyond simple alphabetic . These enhancements allow for more complex encoding of messages containing non-letter characters. Size variations in historical cipher disks range from handheld models approximately 3 to 6 inches in diameter, designed for portability in military or field applications, to smaller pocket-sized versions around 2 inches for discreet use. The prototype, invented by in the , exemplified this compact, mechanical form.

Materials and Construction

Early cipher disks, such as Leon Battista Alberti's device from the 1460s, were constructed using two concentric metal discs attached by a common axle, allowing the inner disc to rotate relative to the outer one. The alphabets were inscribed on the discs, with the outer featuring a standard Latin alphabet and the inner a randomized version for polyalphabetic encryption. By the 19th century, military adaptations shifted toward more durable metals for enhanced portability and resistance in field conditions. The Confederate cipher disk, used during the American Civil War, was fabricated from brass, featuring an outer disc approximately 2.25 inches in diameter and an inner disc about 1.5 inches, with alphabets engraved on both surfaces. Construction techniques emphasized precision to ensure alignment and legibility, often involving stamping or engraving alphabets directly onto the metal surfaces for weather resistance in military applications. A key challenge in cipher disk fabrication was wear from repeated rotation, which could cause misalignment of alphabets over time.

Operation

Encryption Process

The encryption process with a cipher disk uses mechanical substitution via two concentric rings: a fixed outer ring and a rotatable inner ring, each inscribed with the alphabet. The sender and receiver agree on a shared secret key, such as an initial alignment position (e.g., positioning the 'A' on the inner ring opposite the 'K' on the outer ring), which defines the substitution mapping for the message unless adjusted for polyalphabetic operation. To encode a message, the user sets the initial alignment by rotating the inner disk so that the key letter on the inner ring aligns with a reference point, such as 'A', on the outer ring. For each letter, the user locates the letter on the outer ring and reads the letter directly opposite it on the inner ring as the letter. In basic monoalphabetic use, this fixed alignment is maintained throughout the , producing a consistent substitution similar to a variant. For polyalphabetic encryption, the inner disk is rotated to a new alignment after each letter or group of letters, based on a predetermined rule—such as a repeating keyword where each key letter determines the alignment shift—thus changing the substitution alphabet periodically and reducing the effectiveness of . Spaces in the plaintext are typically omitted to create a continuous letter stream, and numbers or non-alphabetic characters may be ignored, replaced with letters, or handled via auxiliary markings if available on the disk; the process is generally designed for the , though historical variants used fewer letters. This approach mechanizes polyalphabetic substitution, equivalent to using a Vigenère tableau but via physical alignment rather than tabular lookup. As an illustrative example, consider the "HELLO" using a fixed shift of 3 positions (initial alignment of inner 'A' with outer 'D'). With the disks set, 'H' on the outer ring aligns with 'K' on the inner ring; 'E' with 'H'; each 'L' with 'O'; and 'O' with 'R', resulting in the "KHOOR". For polyalphabetic use, such as with keyword "KEY", the alignment would be reset for each letter: 'K' shift for first, 'E' for second, 'Y' for third (repeating as needed), yielding varying substitutions.

Decryption Process

The decryption process requires the recipient to have an identical cipher disk and knowledge of the shared , including the initial alignment and any rules for polyalphabetic shifts. The disk is first set to the agreed initial alignment by rotating the inner ring so that the key letter aligns with the reference point, such as 'A', on the outer ring, establishing the substitution mapping. For each letter, the user locates the letter on the inner ring and reads the letter directly opposite it on the outer ring as the letter. This is repeated for the message, adjusting the alignment periodically according to the —for instance, rotating the inner disk to align successive keyword letters with the outer 'A' after each letter or group. In polyalphabetic designs like Alberti's, these shifts vary the mapping in reverse to recover the original text. If transmission errors produce garbled letters, the recipient may test slight adjustments to the alignment or progression for the affected parts until coherent results, aided by the device's simplicity and expected language patterns. The cipher disk enables efficient decryption for long messages compared to manual tabular methods, as direct reading from aligned rings minimizes lookup errors; this practicality supported field use in historical applications of single-disk variants.

Variations

Polyalphabetic Disks

Polyalphabetic cipher disks represent an evolution of the basic mechanical cipher disk, incorporating mechanisms for multiple alphabet shifts to produce more secure polyalphabetic substitution ciphers. These devices use a repeating keyword to determine varying Caesar-like shifts for each plaintext letter, diffusing letter frequencies and complicating simple frequency analysis attacks. By rotating the inner disk according to successive key letters, the encipherer applies a different substitution alphabet to each character, with the key repeating cyclically to generate the full ciphertext. The foundational polyalphabetic disk was invented by around 1467, as described in his treatise De Cifris. This device featured two concentric metal disks, each divided into 24 equal segments along their circumferences. The stationary outer disk bore 20 uppercase letters of the alphabet plus numerals 1–4 for referencing codebooks or nulls, while the movable inner disk carried a mixed lowercase alphabet including letters and symbols such as "et" (&), beginning with "a" opposite the outer's starting point but shifting irregularly thereafter. To encipher, the inner disk was rotated to align the index (often a capital letter) with the first key letter on the outer disk, and subsequent rotations followed the key sequence, yielding 24 possible substitution alphabets and a repeating period of 24. This innovation marked the first practical implementation of polyalphabetic encryption, significantly enhancing security over monoalphabetic systems. Building on Alberti's concept, the Vigenère cipher disk, though named after Blaise de Vigenère, was invented by Alberti in 1467 as an early polyalphabetic device. Later adaptations popularized it as a mechanical implementation of Vigenère's 16th-century tableau. Consisting of two concentric disks—the fixed outer ring with the 26-letter alphabet in standard order and the rotatable inner ring with the same alphabet starting from a variable point—this device allowed users to implement interwoven Caesar shifts based on a keyword. For encryption, the inner disk was aligned so that the first key letter matched the plaintext letter on the outer disk, producing the ciphertext letter where the plaintext aligned on the inner disk; the process repeated for each key letter, cycling through the keyword to create a polyalphabetic effect with a period equal to the keyword length. The disk's simplicity made polyalphabetic ciphers accessible without memorizing tables, though its security depended heavily on keyword choice. A notable application during the was the Confederate cipher disk, a implementation of the Vigenère system introduced around by signal officer Francis LaBarre. This single-disk device featured two concentric circles, each inscribed with the 26 letters of the , enabling polyalphabetic encryption for tactical field communications. Operators set random daily alignments based on a shared keyword—often changed for each message or operation—to scramble into , facilitating secure transmission of short military orders via telegraph or courier. Only about five original examples survive, underscoring its limited but critical role in Confederate . In the 1860s, British physicist Sir developed a variant known as the progressive or clock cipher disk, akin to the Vigenère but designed for administrative use in government and colonial contexts. The device employed two geared hands on concentric disks: an outer ring with 27 positions (A-Z plus a blank) and an inner ring with 26 mixed letters. Rather than relying on a repeating keyword, the mechanism advanced the ciphertext hand one position per plaintext letter while the plaintext hand progressed via a 27:26 gear ratio, generating a non-periodic sequence of shifts over extended messages. This innovation was employed in British colonial administration for diplomatic and official correspondence, providing a user-friendly tool that avoided the need for written keys. Despite their advantages, polyalphabetic disks were constrained by typically short effective key lengths of 20 to 30 positions, corresponding to the size or keyword length, which imposed a detectable periodicity on the . This repetition allowed cryptanalysts, such as and Friedrich Kasiski, to identify the period through repeated n-gram analysis and subsequently recover the key via on each , rendering the systems vulnerable to determined attacks once sufficient was available.

Multi-Disk Systems

Multi-disk cipher systems extend the principles of single-disk designs by employing multiple rotatable wheels or cylinders, each bearing a scrambled , to achieve vastly expanded key spaces through independent rotations and, in some cases, reorderable arrangements. These devices, often mounted on a common , allow the sender to align the across the disks by adjusting each wheel's position, producing from a different alignment, while the recipient uses a shared sequence to reverse the process. This approach builds on polyalphabetic substitution roots found in earlier single-disk mechanisms. The Jefferson wheel cipher, invented by around 1795, represents an early and influential example of such a system. It consists of 36 wooden disks, each inscribed with the 26 letters of the in a unique random order around its edge, threaded onto an iron axle for free rotation. To encrypt a message, the disks are rotated so that the plaintext letters align in a single row across the device; the is then read from any other row formed by the aligned alphabets. Decryption involves setting the disks to match the in one row and scanning for the corresponding alignment, with the large number of disks providing through the immense possible configurations. Jefferson described the device in detail in his notes from 1790–1793, though it was not widely used during his lifetime. In the 1890s, cryptographer Étienne Bazeries developed a similar multi-disk device known as the Bazeries cylinder, primarily for diplomatic communications. This system featured 20 disks, each with a differently mixed alphabet on its periphery, arranged on a shaft that allowed individual rotation. Like Jefferson's design, it operated by aligning across the disks for and using a prearranged to realign for decryption, offering enhanced complexity over simpler ciphers of the era. The Bazeries cylinder was employed by and foreign office channels, providing a mechanical means to generate polyalphabetic substitutions resistant to for short messages. The U.S. Army's M-94 cipher device, adopted in 1922, adapted and refined these concepts for military field use. Designed by Major Mauborgne based on earlier strip ciphers, it comprised 25 brass disks mounted on a , each engraved with the 26 letters in a specific disordered sequence to minimize repetitions. Operators turned the disks sequentially according to a 25-step key to encipher or decipher messages in groups of 25 letters, producing a polyalphabetic output. The M-94 remained in service through and into the , valued for its portability despite its mechanical nature. These multi-disk systems offered significant advantages in security due to their key spaces; for instance, the M-94's 25 independently rotatable disks yielded up to $26^{25} possible rotation combinations alone, far exceeding the permutations of single-disk variants. However, their bulkier construction—requiring a rigid and multiple components—limited them to or transportable use rather than pocket-sized operations, and they demanded careful synchronization between sender and receiver.

Cryptanalysis

Inherent Weaknesses

Cipher disks, whether single or multi-disk variants, suffer from a periodic polyalphabetic substitution mechanism that repeats the key sequence, thereby introducing detectable patterns in the ciphertext. This periodicity allows cryptanalysts to apply techniques like the Kasiski examination, which identifies repeated sequences to infer the key length, provided the message is sufficiently long. The key space in single-disk implementations, such as those based on Vigenère-style rotations, is 26^L for a keyword of length L, but practical usage with short or reused keywords drastically reduces the viable combinations, making brute-force or frequency-based attacks feasible. In contrast, multi-disk systems expand this space through permutations of disk orders (e.g., n! for n disks), yet reliance on fixed alphabets per disk and infrequent changes still constrains overall security against determined analysis. Physical construction introduces additional vulnerabilities inherent to mechanical design. Repeated rotations cause wear on disks, potentially leading to misalignment, faded engravings, or mechanical failure that alters outcomes. Secure distribution of identical devices to all recipients is logistically challenging, as any mismatch invalidates decryption, while transit or storage risks . Furthermore, capture of the device directly exposes the structure—such as disk order or —enabling immediate compromise of ongoing communications. A core structural flaw is the absence of , where each letter encrypts independently relative to its position in the stream or disk alignment, without influencing adjacent letters. This isolation facilitates known-plaintext attacks, as recovering one segment from a crib reveals no information about others, allowing piecemeal reconstruction of the full . Such independent processing mirrors vulnerabilities in related systems like the , where the can verify periodicity without deeper analysis.

Historical Cryptanalytic Attacks

During the , Union cryptanalysts broke Confederate Vigenère ciphers, which were implemented using concentric brass wheel cipher disks, through exploiting short, repeated keywords like "MANCHESTER BLUFF." This allowed decoding of messages within days, revealing Confederate troop movements and exploiting the system's inherent periodicity, where key repetition created detectable cycles in the . In , the U.S. Army's M-94 cipher disk, a 25-wheel polyalphabetic device introduced in 1922, was vulnerable to standard cryptanalytic techniques such as and on individual wheels. These weaknesses, combined with operational limitations, prompted the U.S. to phase out the M-94 by 1943 in favor of more secure systems like the M-209. In modern retrospective analyses, computational tools simulate cipher disk outputs to apply advanced and reveal key lengths efficiently. Software like the dCode frequency analyzer processes simulated Vigenère or disk-generated ciphertexts by computing index-of-coincidence metrics across potential periods, identifying key lengths as short as 4-10 characters from texts as brief as 200 symbols. These programs, building on Kasiski's examination method, demonstrate how historical disks' periodic structures remain exploitable today, often recovering full keys in seconds on standard hardware.

Legacy

Influence on Modern Cryptography

The cipher disk, exemplified by Thomas Jefferson's 1795 wheel cipher, served as a foundational precursor to rotor machines in the early . Its design, featuring multiple rotating wheels each providing a unique substitution alphabet, served as a conceptual precursor to the development of electromechanical devices like the , where multiple rotors provided polyalphabetic substitutions similar to those achieved by the multiple alphabets on the disks, obscuring . This evolution allowed for faster, automated encryption while retaining the core principle of variable alphabets to obscure , bridging manual mechanical systems to electrical ones during the . Theoretically, the cipher disk advanced polyalphabetic substitution by demonstrating a practical implementation of multiple independent alphabets on separate wheels, expanding beyond earlier single-disk methods like Alberti's 15th-century device and providing a larger key space through wheel permutations—over 3.72 × 10^41 possibilities for 36 wheels—without relying on repeating keywords. This contributed to the conceptual shift from monoalphabetic ciphers to more complex systems, influencing cryptographic theory by highlighting how mechanical multiplicity could enhance and , principles later formalized in modern design criteria. Its use in U.S. military variants, such as the M-94 cipher disk employed from 1922 to 1943, further illustrated these ideas in operational settings before electromechanical alternatives emerged. In terms of , the cipher disk's reliance on a fixed, shared order as the secret exposed vulnerabilities from and secure distribution challenges, underscoring the need for non-repeating keys in high-stakes communications and paving the way for one-time systems like the 1917 Vernam cipher, which automated random key streams for perfect secrecy. By the , however, cipher disks were largely supplanted by rotor-based and electronic cryptosystems due to their manual speed limitations and susceptibility to physical compromise or , marking the transition to automated, higher-throughput in wartime and beyond.

Educational and Recreational Uses

In the , cipher disks have been adapted into educational kits for teaching in schools, often simulating historical designs like those of Alberti and using accessible materials such as 3D-printed components. For instance, the Cipher Disk Kit from Pre-Academy includes physical tools for Alberti and ciphers, enabling students to encode and decode messages while introducing concepts in , cybersecurity, and . Similarly, printable Alberti Disk templates on allow students to construct identical wheels for collaborative messaging activities, fostering understanding of polyalphabetic substitution. offers free 3D-printable models of 's disk cipher, designed for lessons on and mathematics. Hobbyist recreations of cipher disks have gained popularity since the 2010s, with DIY projects using wooden materials in makerspaces and online communities. provides step-by-step guides for building wooden Jefferson wheel cyphers, appealing to puzzle enthusiasts seeking tactile encryption experiences. Makerspaces often incorporate these projects, such as quick cipher wheel assemblies from cardboard or wood, as seen in educational tutorials from 2020 onward. Online simulators further support hobbyists; dCode.fr features an interactive Alberti wheel cipher tool for virtual encryption and decryption. Museum exhibits highlight cipher disks for public education, with interactive replicas enhancing visitor engagement. The displays the cipher device, recognized as one of the oldest true cipher machines, allowing close examination of its mechanical principles. It also features the U.S. Army M-94 cylinder cipher, a multi-disk system derived from Jefferson's design, on view alongside related artifacts. The exhibits an operational M-94 replica, where visitors can manipulate the disks to encode messages, simulating early 20th-century military cryptography. Digital emulations have expanded access since 2020, with mobile apps integrating cipher disks into curricula. The app on offers an interactive wheel with presets for M-94 and Jefferson-36 configurations, enabling users to share encrypted messages and explore historical on smartphones. These tools address gaps in traditional resources by embedding cipher disk activities into broader programs, such as Cyber.org's classroom modules that use disk-building to teach basics and spark discussions on digital security.

References

  1. [1]
    The Alberti Cipher - Computer Science - Trinity College
    Apr 25, 2010 · The Alberti cipher traditionally consisted of two metal discs, one mobile, and one immobile, attached by a common axle so that the inner disc ...
  2. [2]
    [PDF] The Cipher Disk
    As invented in Italy sometime before 1470, it had similar concentric disks with the exception that one contained a "mixed" {scrambled) alphabet Also, in some of ...
  3. [3]
    Other Vigenère Cipher Devices - Michigan Technological University
    The first device, the cipher disk, was invented by Leon Battista Alberti (1404--1472). This cipher disk has two concentric disks, with the large bottom one ...
  4. [4]
    [PDF] How mathematics spread and transformed cryptographic activities
    Feb 8, 2023 · Changing the key means changing the disk order. This device would be reinvented by. Étienne Bazeries (1846-1931) in 1891 – the same who also ...
  5. [5]
    Leon Battista Alberti Describes "The Alberti Cipher"
    Leon Battista Alberti Offsite Link wrote De Cifris describing the first polyalphabetic substitution with mixed alphabets and variable period.Missing: primary | Show results with:primary
  6. [6]
    Polyalphabetic Ciphers before 1600 - Cryptiana
    Aug 28, 2025 · Leon Battista Alberti's treatise, De componendis cifris or De cifris, written in 1466 or 1467, describes a cipher disk and advises changing the ...Missing: English | Show results with:English
  7. [7]
    Renaissance science – XLVI
    Nov 2, 2022 · In order to implement his method Alberti invented his cipher disc, which he explained in a letter was inspired by the recent invention of the ...Missing: variants | Show results with:variants
  8. [8]
    Cipher Machines
    The Vigenère cipher disk was named for Blaise de Vigenère, even though it was invented in 1467 by Leon Battista Alberti, 56 years before Vigenère was born. ...
  9. [9]
    Cipher disk | cryptology - Britannica
    In 1891 Étienne Bazeries, a French cryptologist, invented a more sophisticated cipher device based on principles formulated by Thomas Jefferson of the United ...
  10. [10]
    Vigenère cipher | Research Starters - EBSCO
    Historically, the cipher was prominent among diplomats seeking secure communication until it was effectively broken in the nineteenth century, which diminished ...Missing: disk European
  11. [11]
    Cryptology - WWI, WWII, Codes | Britannica
    Oct 27, 2025 · During the first two years of World War I, code systems were used for high-command and diplomatic communications, just as they had been for centuries.
  12. [12]
    Wheel Cipher - Thomas Jefferson's Monticello
    The Wheel Cipher is an encoding (enciphering) device first described by Jefferson in early 1790s that was later adopted (as M-94) by the U.S. military.
  13. [13]
    Jefferson disk - Crypto Museum
    Aug 16, 2010 · The Jefferson disk is also known as the Jefferson Wheel Cipher or the Bazeries Cylinder. It was invented in 1795 by the third US president, ...Missing: diplomatic | Show results with:diplomatic
  14. [14]
    Confederate Cipher Disc - Crypto Museum
    Aug 26, 2010 · The Confederate Cipher Disc was a mechanical wheel cipher consisting of two concentric discs, each with the 26 letters of the Latin alphabet, ...
  15. [15]
    Confederate Ciphers during the Civil War: Various Vigenere Keywords
    The Confederates used a polyalphabetic (Vigenere) cipher during the Civil War. The present article describes its use with various keywords.Baltimore" -- Kirby Smith... · Manchester Bluff" -- J.E... · Jefferson Davis, S. Cooper...
  16. [16]
    M-94 - Crypto Museum
    Dec 31, 2023 · M-94 was a polyalphabetic manual substitution cipher device for tactical messages, developed around 1917 1 by US Army major Joseph O. Mauborgne, ...Missing: Wheatstone 1922-1943
  17. [17]
    [PDF] Cryptology, the Secret Battlefield of World War I:
    Cipher Technologies Used in WWI​​ The Vigenère disk, code books, and various methods of transposition ciphers were the most widely used ciphers of WWI. All of ...
  18. [18]
    Confederate Code Disc
    An extremely rare decoding device used by the Confederates to encrypt secret messages throughout the Civil War.Missing: 1860s | Show results with:1860s
  19. [19]
    The Cipher Disk - Signal Corps
    The Confederate Cipher Disk: (A Polyalphabetic cipher disk), was a mechanical wheel cipher consisting of two concentric disks, each with the 26 letters of the ...
  20. [20]
    Thomas Jefferson Wheel Cypher - Instructables
    In this Instructable, I will build a Wheel Cypher that was invented by Thomas Jefferson in the early 1790's. His was made from wood.Missing: construction | Show results with:construction
  21. [21]
    [PDF] THE GENESIS OF THE JEFFERSON/BAZERIES CIPHER DEVICE
    Jun 4, 2010 · Manly, a Chaucer scholar and cryptanalyst in World War I, revealed that before Babbage and Bazeries, Jefferson had invented a cipher device ...
  22. [22]
    US Army Cipher Device M-94 - Apprendre-en-ligne.net
    U.S. Army Cipher Device M-94 ... This device consists of 25 alphabet discs, on the rim of each there is a stamped a different, completely disarranged alphabet.Missing: Wheatstone 1922-1943
  23. [23]
    Alberti's Wheel Cipher Disk - Online Decoder, Encoder, Translator
    What is the Alberti cipher? (Definition). The Alberti cipher is a polyalphabetic cipher system that uses two mobile concentric disks which can rotate.
  24. [24]
    Leon Battista Alberti's cipher disk - Telsy
    Jul 18, 2022 · Leon Battista Alberti's cipher disk, described in “De cifris” around 1467, is the first polyalphabetic encryption system.Missing: primary sources
  25. [25]
    M-94
    The M-94 was a W.W.II United States Army Signal Corps cipher device used from the early 1920's up till 1942 as a low level, tactical, ...Missing: Wheatstone 1922-1943
  26. [26]
    Polyalphabetic Substitution Cipher - Cornell University
    One way is to use more than one alphabet, switching between them systematically. This type of cipher is called a polyalphabetic substitution cipher.Missing: disk | Show results with:disk
  27. [27]
    18th Century Cipher Device - National Security Agency
    Aug 3, 2021 · It was apparently for use with the French language, the world's diplomatic language used through World War I.Missing: 1795 | Show results with:1795
  28. [28]
    Jefferson's Cipher – Pic of the Week | In Custodia Legis
    Aug 17, 2018 · This cipher was a wooden wheel assembled by 36 disks strung together on a metal axle, with each disk containing every letter of the alphabet in random order.Missing: 1795 diplomatic
  29. [29]
    [PDF] CODES AND CIPHERS (CRYPTOLOGY) ARTICLE BY WILLIAM F ...
    This type of cryptogram is usually referred to as the Vigenere cipher or as le chiffre indecliiffrable, although Blaise de Vigenere never claimed that he ...
  30. [30]
    [PDF] 2nd Issue 1991 - National Security Archive
    Oct 17, 2012 · The. Bazeries "cylinder-cipher" comprised 20 disks or wheels-rotors, one might say-arranged in a specified order on a shaft or axle. The ...
  31. [31]
    MG Joseph O. Mauborgne, USA - National Security Agency
    His M-94 cylinder cipher improved Hitt's device by employing 25 cipher disks, thereby minimizing alphabet repetition. The army used his M-94 until the 1950s.
  32. [32]
    [PDF] AMERICAN CRYPTOLOGY NATIONAL SECURITY AGENCY
    U.S. Army cipher device M-94, developed in the 1920s. The M-94 was virtually identical in principle to Jefferson's cipher wheel. Page 3. German Enigma, Four ...Missing: disk | Show results with:disk
  33. [33]
    None
    Summary of each segment:
  34. [34]
    [PDF] military cryptanalysis
    Dec 23, 2013 · Military cryptanalysis involves alphabetic substitution systems, fundamental principles, and frequency distributions.
  35. [35]
    Frequency Analysis Tools - Online Letter Ngram Counter/Analyzer
    Tools for frequency analysis, a cryptanalysis method studying the frequency of letters or groups of characters in a ciphered message.
  36. [36]
    Jefferson cipher
    The Playfair cipher was invented by Charles Wheatstone who named it after ... US Army M-94 Cipher Wheel - 1922-43. CHM. The cipher wheel was originally ...
  37. [37]
    Cipher Disk Kit: Alberti & Mexican Army Ciphers - STEM Pre-Academy
    These physical cipher tools allow students to encode and decode secret messages, introducing key concepts in computer science, cybersecurity, modular arithmetic ...Missing: educational schools
  38. [38]
    Alberti Disk Cipher Wheel by Mr Dignan's Desk - TPT
    $$1.00 In stock Rating 4.8 (9) This Alberti Disk is a great code making tool. Have students all work together to create exact clones so they can write coded messages to one another.
  39. [39]
    Jefferson disk cipher by --graffiti_maker_SG-- - Thingiverse
    Aug 5, 2016 · Lesson/Activity: Teach your students about President Thomas Jefferson's Disk cypher. The history, math, etc.… Try other simple codes and ...Missing: kit | Show results with:kit
  40. [40]
    How to make a CIPHER WHEEL! - YouTube
    Oct 12, 2020 · Learn about cryptography by making a CIPHER WHEEL! SUBSCRIBE - https://www.youtube.com/channel/UCR2z5oXyl6oiA5Gv8M9h62g?sub_confirmation=1 ...
  41. [41]
    World's Oldest True Cipher Device, the “Jefferson Cipher,” on ...
    Dec 19, 2022 · The device itself was discovered in an antique shop in West Virginia, near where Jefferson once owned land. This early cipher machine, whether ...Missing: wheel | Show results with:wheel
  42. [42]
    Information Assurance - National Cryptologic Foundation
    Different from the cylindrical cipher device that Jefferson designed, which used 26 disks with numbers on the side, this device uses 40 disks. Each disk has 42 ...
  43. [43]
    M-94 Cipher Device | International Spy Museum
    The M-94 was widely used from 1922 to 1943 by the US Army as tactical, cryptographic encoding/decoding device.Missing: Wheatstone | Show results with:Wheatstone
  44. [44]
    Jefferson Disk - Cipher wheel - Apps on Google Play
    Sep 13, 2025 · Features ✓ Interactive cipher wheel ✓ Fully configurable ✓ Share configuration with others ✓ Presets (M94, Jefferson-36) Historic Background
  45. [45]
    Classroom Activity: Building a Cypher Disk - Cyber.org
    Nov 28, 2017 · This easy activity is a great hands-on way to introduce middle schoolers to the concepts of encryption and decryption and to start conversations ...Missing: app digital 2020